US20210049500A1 - Model training framework - Google Patents
Model training framework Download PDFInfo
- Publication number
- US20210049500A1 US20210049500A1 US16/541,751 US201916541751A US2021049500A1 US 20210049500 A1 US20210049500 A1 US 20210049500A1 US 201916541751 A US201916541751 A US 201916541751A US 2021049500 A1 US2021049500 A1 US 2021049500A1
- Authority
- US
- United States
- Prior art keywords
- model
- training
- during
- configuration
- parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G06F11/3664—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/3698—Environments for analysis, debugging or testing of software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
Definitions
- Machine learning can be utilized to perform various types of tasks. For example, machine learning can be used for image recognition, video recognition, text recognition, generating recommendations, data security, fraud detection, online search, natural language processing, etc.
- a machine learning model is trained using a training data set of labeled data samples, such as where the machine learning model is trained with photos labeled as “photo of a car” and “photo not of a car.” After training, the machine learning model can process other photos in order to predict whether such photos depict a car or not.
- custom programming code In order to train a particular machine learning model and evaluate performance of the machine learning model from the training, custom programming code must be manually written to train the machine learning model. Unfortunately, manually writing custom programming code for every individual machine learning model is cumbersome and resource intensive.
- the model training framework can be used to train any type of model that is input into the model training framework.
- a definition of a model and a configuration of the model is received by the model training framework.
- the definition and configuration of the model may describe the model, what computations the model performs, what parameters the model uses during operation, what hyper parameters should be used to train the model, regularization to apply to the parameters, a learning rate, a training loss function, whether and when checkpoints are to be created, whether and when to enable a debugging mode, a training batch size of training data to input per training iteration, a decay learning rate, optimization procedures to implement, etc.
- the model training framework may save a record of the model based upon the definition and configuration according to a human readable text format and/or a machine readable serialized format.
- the model training framework may setup computations that the model will perform during training of the model based upon the definition and the configuration.
- the computations may be spread/assigned across a plurality of processing units, such as graphical processing units, such that outputs by the processing units may be aggregated to determine an output of the model during training.
- Summary statistics that are to be tracked and/or reported out during training may be specified.
- the summary statistics may correspond to a training loss function, a value of a regularization loss added to the parameters of the model during training, a learning rate, checkpoints created during training, a training batch size, a number of steps performed by the computations, values of parameters during training, a total training time, etc.
- the model training framework may be configured to perform one or more training iterations to train the model using batches of training data. For example, a first batch of training data is inputted into the model during a first training iteration. The model may perform the computations upon the first batch of training data. During the first training iteration, the summary statistics are tracked. After the first training iteration, the parameters of the model are updated based upon a function (e.g., the parameters are updated in a manner that minimize a loss function). The updated parameters of the model may be used during a second training iteration to process a second batch of the training data. In this way, any number of training iterations may be performed by the model training framework. The summary statistics of the training may be outputted by the model training framework, such as to a user that requested the training of the model.
- FIG. 1 is an illustration of a scenario involving various examples of networks that may connect servers and clients.
- FIG. 2 is an illustration of a scenario involving an example configuration of a server that may utilize and/or implement at least a portion of the techniques presented herein.
- FIG. 3 is an illustration of a scenario involving an example configuration of a client that may utilize and/or implement at least a portion of the techniques presented herein.
- FIG. 4 is a flow chart illustrating an example method for a model training framework.
- FIG. 5A is a component block diagram illustrating an example system for a model training framework, where a model definition and configuration is received.
- FIG. 5B is a component block diagram illustrating an example system for a model training framework, where computations that a model will perform are set up.
- FIG. 5C is a component block diagram illustrating an example system for a model training framework, where a first training iteration is performed.
- FIG. 5D is a component block diagram illustrating an example system for a model training framework, where a second training iteration is performed.
- FIG. 6 is an illustration of a scenario featuring an example non-transitory machine readable medium in accordance with one or more of the provisions set forth herein.
- FIG. 1 is an interaction diagram of a scenario 100 illustrating a service 102 provided by a set of servers 104 to a set of client devices 110 via various types of networks.
- the servers 104 and/or client devices 110 may be capable of transmitting, receiving, processing, and/or storing many types of signals, such as in memory as physical memory states.
- the servers 104 of the service 102 may be internally connected via a local area network 106 (LAN), such as a wired network where network adapters on the respective servers 104 are interconnected via cables (e.g., coaxial and/or fiber optic cabling), and may be connected in various topologies (e.g., buses, token rings, meshes, and/or trees).
- LAN local area network
- the servers 104 may be interconnected directly, or through one or more other networking devices, such as routers, switches, and/or repeaters.
- the servers 104 may utilize a variety of physical networking protocols (e.g., Ethernet and/or Fiber Channel) and/or logical networking protocols (e.g., variants of an Internet Protocol (IP), a Transmission Control Protocol (TCP), and/or a User Datagram Protocol (UDP).
- IP Internet Protocol
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- the local area network 106 may include, e.g., analog telephone lines, such as a twisted wire pair, a coaxial cable, full or fractional digital lines including T1, T2, T3, or T4 type lines, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links, or other communication links or channels, such as may be known to those skilled in the art.
- ISDNs Integrated Services Digital Networks
- DSLs Digital Subscriber Lines
- the local area network 106 may be organized according to one or more network architectures, such as server/client, peer-to-peer, and/or mesh architectures, and/or a variety of roles, such as administrative servers, authentication servers, security monitor servers, data stores for objects such as files and databases, business logic servers, time synchronization servers, and/or front-end servers providing a user-facing interface for the service 102 .
- network architectures such as server/client, peer-to-peer, and/or mesh architectures, and/or a variety of roles, such as administrative servers, authentication servers, security monitor servers, data stores for objects such as files and databases, business logic servers, time synchronization servers, and/or front-end servers providing a user-facing interface for the service 102 .
- the local area network 106 may comprise one or more sub-networks, such as may employ differing architectures, may be compliant or compatible with differing protocols and/or may interoperate within the local area network 106 . Additionally, a variety of local area networks 106 may be interconnected; e.g., a router may provide a link between otherwise separate and independent local area networks 106 .
- the local area network 106 of the service 102 is connected to a wide area network 108 (WAN) that allows the service 102 to exchange data with other services 102 and/or client devices 110 .
- the wide area network 108 may encompass various combinations of devices with varying levels of distribution and exposure, such as a public wide-area network (e.g., the Internet) and/or a private network (e.g., a virtual private network (VPN) of a distributed enterprise).
- a public wide-area network e.g., the Internet
- a private network e.g., a virtual private network (VPN) of a distributed enterprise.
- VPN virtual private network
- the service 102 may be accessed via the wide area network 108 by a user 112 of one or more client devices 110 , such as a portable media player (e.g., an electronic text reader, an audio device, or a portable gaming, exercise, or navigation device); a portable communication device (e.g., a camera, a phone, a wearable or a text chatting device); a workstation; and/or a laptop form factor computer.
- client devices 110 may communicate with the service 102 via various connections to the wide area network 108 .
- one or more client devices 110 may comprise a cellular communicator and may communicate with the service 102 by connecting to the wide area network 108 via a wireless local area network 106 provided by a cellular provider.
- one or more client devices 110 may communicate with the service 102 by connecting to the wide area network 108 via a wireless local area network 106 provided by a location such as the user's home or workplace (e.g., a WiFi (Institute of Electrical and Electronics Engineers (IEEE) Standard 802.11) network or a Bluetooth (IEEE Standard 802.15.1) personal area network).
- the servers 104 and the client devices 110 may communicate over various types of networks.
- Other types of networks that may be accessed by the servers 104 and/or client devices 110 include mass storage, such as network attached storage (NAS), a storage area network (SAN), or other forms of computer or machine readable media.
- NAS network attached storage
- SAN storage area network
- FIG. 2 presents a schematic architecture diagram 200 of a server 104 that may utilize at least a portion of the techniques provided herein.
- a server 104 may vary widely in configuration or capabilities, alone or in conjunction with other servers, in order to provide a service such as the service 102 .
- the server 104 may comprise one or more processors 210 that process instructions.
- the one or more processors 210 may optionally include a plurality of cores; one or more coprocessors, such as a mathematics coprocessor or an integrated graphical processing unit (GPU); and/or one or more layers of local cache memory.
- the server 104 may comprise memory 202 storing various forms of applications, such as an operating system 204 ; one or more server applications 206 , such as a hypertext transport protocol (HTTP) server, a file transfer protocol (FTP) server, or a simple mail transport protocol (SMTP) server; and/or various forms of data, such as a database 208 or a file system.
- HTTP hypertext transport protocol
- FTP file transfer protocol
- SMTP simple mail transport protocol
- the server 104 may comprise a variety of peripheral components, such as a wired and/or wireless network adapter 214 connectible to a local area network and/or wide area network; one or more storage components 216 , such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader.
- peripheral components such as a wired and/or wireless network adapter 214 connectible to a local area network and/or wide area network
- storage components 216 such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader.
- the server 104 may comprise a mainboard featuring one or more communication buses 212 that interconnect the processor 210 , the memory 202 , and various peripherals, using a variety of bus technologies, such as a variant of a serial or parallel AT Attachment (ATA) bus protocol; a Uniform Serial Bus (USB) protocol; and/or Small Computer System Interface (SCI) bus protocol.
- a communication bus 212 may interconnect the server 104 with at least one other server.
- Other components that may optionally be included with the server 104 (though not shown in the schematic architecture diagram 200 of FIG.
- a display such as a graphical processing unit (GPU); input peripherals, such as a keyboard and/or mouse; and a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting the server 104 to a state of readiness.
- a display adapter such as a graphical processing unit (GPU)
- input peripherals such as a keyboard and/or mouse
- a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting the server 104 to a state of readiness.
- BIOS basic input/output system
- the server 104 may operate in various physical enclosures, such as a desktop or tower, and/or may be integrated with a display as an “all-in-one” device.
- the server 104 may be mounted horizontally and/or in a cabinet or rack, and/or may simply comprise an interconnected set of components.
- the server 104 may comprise a dedicated and/or shared power supply 218 that supplies and/or regulates power for the other components.
- the server 104 may provide power to and/or receive power from another server and/or other devices.
- the server 104 may comprise a shared and/or dedicated climate control unit 220 that regulates climate properties, such as temperature, humidity, and/or airflow. Many such servers 104 may be configured and/or adapted to utilize at least a portion of the techniques presented herein.
- FIG. 3 presents a schematic architecture diagram 300 of a client device 110 whereupon at least a portion of the techniques presented herein may be implemented.
- client device 110 may vary widely in configuration or capabilities, in order to provide a variety of functionality to a user such as the user 112 .
- the client device 110 may be provided in a variety of form factors, such as a desktop or tower workstation; an “all-in-one” device integrated with a display 308 ; a laptop, tablet, convertible tablet, or palmtop device; a wearable device mountable in a headset, eyeglass, earpiece, and/or wristwatch, and/or integrated with an article of clothing; and/or a component of a piece of furniture, such as a tabletop, and/or of another device, such as a vehicle or residence.
- the client device 110 may serve the user in a variety of roles, such as a workstation, kiosk, media player, gaming device, and/or appliance.
- the client device 110 may comprise one or more processors 310 that process instructions.
- the one or more processors 310 may optionally include a plurality of cores; one or more coprocessors, such as a mathematics coprocessor or an integrated graphical processing unit (GPU); and/or one or more layers of local cache memory.
- the client device 110 may comprise memory 301 storing various forms of applications, such as an operating system 303 ; one or more user applications 302 , such as document applications, media applications, file and/or data access applications, communication applications such as web browsers and/or email clients, utilities, and/or games; and/or drivers for various peripherals.
- the client device 110 may comprise a variety of peripheral components, such as a wired and/or wireless network adapter 306 connectible to a local area network and/or wide area network; one or more output components, such as a display 308 coupled with a display adapter (optionally including a graphical processing unit (GPU)), a sound adapter coupled with a speaker, and/or a printer; input devices for receiving input from the user, such as a keyboard 311 , a mouse, a microphone, a camera, and/or a touch-sensitive component of the display 308 ; and/or environmental sensors, such as a global positioning system (GPS) receiver 319 that detects the location, velocity, and/or acceleration of the client device 110 , a compass, accelerometer, and/or gyroscope that detects a physical orientation of the client device 110 .
- GPS global positioning system
- Other components that may optionally be included with the client device 110 include one or more storage components, such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader; and/or a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting the client device 110 to a state of readiness; and a climate control unit that regulates climate properties, such as temperature, humidity, and airflow.
- storage components such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader; and/or a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting the client device 110 to a state of readiness
- BIOS basic input/output system
- climate control unit that regulates climate properties, such as temperature, humidity, and airflow.
- the client device 110 may comprise a mainboard featuring one or more communication buses 312 that interconnect the processor 310 , the memory 301 , and various peripherals, using a variety of bus technologies, such as a variant of a serial or parallel AT Attachment (ATA) bus protocol; the Uniform Serial Bus (USB) protocol; and/or the Small Computer System Interface (SCI) bus protocol.
- the client device 110 may comprise a dedicated and/or shared power supply 318 that supplies and/or regulates power for other components, and/or a battery 304 that stores power for use while the client device 110 is not connected to a power source via the power supply 318 .
- the client device 110 may provide power to and/or receive power from other client devices.
- descriptive content in the form of signals or stored physical states within memory may be identified.
- Descriptive content may be stored, typically along with contextual content.
- the source of a phone number e.g., a communication received from another user via an instant messenger application
- Contextual content may identify circumstances surrounding receipt of a phone number (e.g., the date or time that the phone number was received), and may be associated with descriptive content.
- Contextual content may, for example, be used to subsequently search for associated descriptive content. For example, a search for phone numbers received from specific individuals, received via an instant messenger application or at a given date or time, may be initiated.
- the client device 110 may include one or more servers that may locally serve the client device 110 and/or other client devices of the user 112 and/or other individuals.
- a locally installed webserver may provide web content in response to locally submitted web requests.
- Many such client devices 110 may be configured and/or adapted to utilize at least a portion of the techniques presented herein.
- the model training framework is configured to train any type of model, such as various types of machine learning models, which are input into the model training framework. This allows a developer of a model to train the model using the model training framework without having to write custom code tailored to that particular model. This greatly reduces the manual human effort and resources otherwise wasted in writing such custom code for each individual model. Furthermore, the time and resources used to train the model are improved because the training can be spread across multiple processors by the model training framework. Furthermore, a ranking model is provided with improve accuracy for processing input images for identifying other similar images such as images that depict the same object as the input image.
- model training framework 502 An embodiment of a model training framework 502 is illustrated by an example method 400 of FIG. 4 , which is described in conjunction with system 500 of FIGS. 5A-5D .
- the model training framework 502 may comprise simple and easy to use application programming interfaces (APIs) through which a user can input a model 506 and information about the model 506 for training the model 506 . Accordingly, the model training framework 502 receives input 504 of a definition and configuration of the model 506 , at 402 .
- APIs application programming interfaces
- the definition and configuration may describe the model 506 , inputs of the model 506 , outputs of the model 506 , computations performed by the model 506 , modifiable parameters of the model 506 , hyper parameters used to train the model 506 , and/or other information relating to operation of the model 506 and/or training of the model 506 , such as a training loss function, regularization to add to the parameters, a learning rate, a batch size of input data to train per training iteration, whether and when a debug mode should be enabled, whether and when checkpoints should be created, a decay learning rate, an initial learning rate value, optimizations to apply to the model 506 during training, etc.
- the model training framework 502 may store a record of the model 506 as a structure having a serialized machine readable format and/or a textual human readable format.
- the record may comprise information relating to the definition and configuration of the model 506 , along with information related to the training of the model 506 , such as checkpoints created during the training, a training batch size, an initial learning rate value, a decay learning rate, parameters of the model 506 , values of the parameters during various points in time during training, etc.
- the user can view and interpret the record in the textual human readable format, and the model training framework 502 can access and train the model 506 using the record in the serialized machine readable format.
- the model training framework 502 may set up computations 508 that the model 506 will perform during training of the model 506 , as illustrated by FIG. 5B .
- the computations 508 may be identified and setup by the model training framework 502 based upon the definition and configuration of the model 506 .
- the model training framework 502 may assign the computations 508 across multiple processors, such as graphical processing units, so that some computations 508 may be performed in parallel. This may reduce the training time of the model 506 by efficiently utilizing available resources as opposed the all computations being performed by a single processing unit.
- the model training framework 502 may be configured to aggregate outputs from the processors in order to generate an overall output of the model 506 during training.
- the model training framework 502 may apply various modifications to the model 506 for training. For example, the model training framework 502 may add weights to the model 506 based upon regularization information specified within the configuration of the input 504 . The model training framework 502 may apply any optimizations specified by the input 504 to the model 506 .
- a regularization term is added to the loss function (e.g., the function that training is working towards minimizing) for each parameter of the model 506 during training.
- Regularization may be any technique used to make a machine learning model generalize better to unseen data, possibly at the expense of performance on the training data.
- the regularization added may be referred to as weight decay or L 2 regularization, and corresponds to increasing the loss function when numerical values of the parameters are larger.
- the model training framework 502 automatically adds this regularization, and incorporates a subset of the parameters of the model 506 specified by the user with a regular expression or other filtering function (e.g., incorporating all trainable model parameters by default).
- the user may also specify a strength of this regularization (e.g., a relative weight of the term in the loss function compared to the loss defined in the model definition), which could be zero or any other value.
- summary statistics 510 that are to be tracked during training are specified by the model training framework 502 .
- the model training framework 502 may specify the summary statistics to track as a training loss function used to update parameters of the model 506 during training, a value of regularization loss to add to the parameters during training, a learning rate, performance statistics of the model 506 during training, outputs of the model 506 , and/or a wide variety of other information relating to the training of the model 506 .
- the model training framework 502 may perform one or more training iterations to train the model 506 based upon batches of training data 514 , at 408 .
- the model training framework 502 may perform a first training iteration, as illustrated by FIG. 5C .
- the model training framework 502 may acquire a first batch 516 of training data 514 .
- the first batch 516 of the training data 514 may comprise an amount of the training data 514 corresponding to the batch size specified for training the model 506 .
- the model training framework 502 inputs the first batch 516 of the training data 514 into the model 506 for training the model 506 based upon the hyper parameters specified within the configuration of the model 506 .
- the computations 508 performed by the model 506 will process the first batch 516 of the training data 514 to generate a first output 518 .
- the summary statistics 510 are tracked and stored by the model training framework 502 .
- current values of the parameters may be periodically saved as the summary statistics 510 .
- Other information may be saved as the summary statistics 510 , such as a number of steps performed by the computations 508 of the model 506 , a current value of the function (the loss function), a current value of a learning rate, a total training time, etc.
- the model training framework 502 may generate one or more checkpoints 512 .
- a checkpoint may comprise progress of the model 506 during the first training iteration.
- the checkpoint may be used to restart the first training iteration from the checkpoint so that the entire first training iteration does not need to be restarted.
- the checkpoint may be generated based upon a user specified trigger/time, a default trigger/time, and/or based upon the model training framework 502 receiving an exit command during the first training iteration (e.g., the creation of the checkpoint may be automatically triggered based upon receipt of the exit command).
- the model training framework 502 may enter into a debug mode where a user has access to execution functionality/code of the model 506 being executed by the model training framework 502 .
- the model training framework 502 may enter into the debug mode based upon a debug mode request from the user.
- the model training framework 502 may enter into the debug mode based upon the configuration of the model 506 specifying that debug mode should be activated based upon some condition (e.g., an amount of training time has occurred, a particular computation is being executed, a certain amount of training data has been processed, etc.).
- the parameters of the model 506 may be updated based upon a function corresponding to accuracy of the model processing the first batch 516 of the training data 514 , such as a loss function (a training loss function). For example, the parameters are updated to minimize the loss function.
- the parameters of the model 506 may be updated during or after the first training iteration.
- the summary statistics 510 are outputting, such as saved or displayed to a user. The summary statistics 510 may be outputted by the model training framework 502 during or after the first training iteration.
- any number of training iterations may be performed by the model training framework 502 upon the model 506 , such as a second training iteration, as illustrated by FIG. 5D .
- the model training framework 502 may input a second batch 530 of the training data 514 into the model 506 for processing by the computations 508 .
- the model training framework 502 may track various information during the second training iteration as the summary statistics 510 .
- the model training framework 502 may generate one or more checkpoints 512 during the second training iteration, which can be used to restart the second training iteration at a particular checkpoint.
- the model 506 may generate an output 532 based upon the second training iteration, which can be evaluated to see how accurately the model 506 processed the second batch 530 of the training data 514 .
- the model training framework 502 may adjust values of the parameters of the model 506 based upon the function (e.g., adjusting parameters to minimize the loss function) and/or the output 532 (e.g., an indication of how accurately the model 506 processed the second batch 530 of the training data 514 ).
- the model training framework 502 may receive an action definition from the user.
- the action definition may specify an action to perform upon the model 506 .
- the action may be to evaluate performance of the model 506 during testing after the training is complete.
- the model training framework 502 may execute the action as a script upon the model 506 .
- the model 506 is trained to identify images having a similar characteristic as an input image.
- the characteristic may correspond to a depiction of an entity (e.g., an object, a person, a cat, text, etc.).
- a user can input a query image into the model 506 in order to receive search results of other similar images, such as images depicting a similar entity as the entity depicted by the query image.
- the model training framework 502 trains this model 506 by inputting pairs of images from the training data 514 into the model 506 .
- a pair of images comprises images having a same characteristic (e.g., two images depicting a cat). Parameters of the model 506 may be updated to minimize a loss function based upon an accuracy of the model 506 to identify images having similar characteristics during training.
- the model 506 may be tested or deployed. For example, a query image may be inputted into the model 506 .
- the model 506 may compute an embedding vector representing characteristics of the query image.
- the model 506 is controlled to compare the embedding vector to embedding vectors of images within a catalog of images to rank the images within the catalog according to similarity of the images to the query image.
- One or more of the images may be returned as query results for the query image based upon ranks of the one or more images.
- FIG. 6 is an illustration of a scenario 600 involving an example non-transitory machine readable medium 602 .
- the non-transitory machine readable medium 602 may comprise processor-executable instructions 612 that when executed by a processor 616 cause performance (e.g., by the processor 616 ) of at least some of the provisions herein.
- the non-transitory machine readable medium 602 may comprise a memory semiconductor (e.g., a semiconductor utilizing static random access memory (SRAM), dynamic random access memory (DRAM), and/or synchronous dynamic random access memory (SDRAM) technologies), a platter of a hard disk drive, a flash memory device, or a magnetic or optical disc (such as a compact disk (CD), a digital versatile disk (DVD), or floppy disk).
- SRAM static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- the example non-transitory machine readable medium 602 stores computer-readable data 604 that, when subjected to reading 606 by a reader 610 of a device 608 (e.g., a read head of a hard disk drive, or a read operation invoked on a solid-state storage device), express the processor-executable instructions 612 .
- the processor-executable instructions 612 when executed cause performance of operations, such as at least some of the example method 400 of FIG. 4 , for example.
- the processor-executable instructions 612 are configured to cause implementation of a system, such as at least some of the example system 500 of FIGS. 5A-5D , for example.
- ком ⁇ онент As used in this application, “component,” “module,” “system”, “interface”, and/or the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a controller and the controller can be a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
- first,” “second,” and/or the like are not intended to imply a temporal aspect, a spatial aspect, an ordering, etc. Rather, such terms are merely used as identifiers, names, etc. for features, elements, items, etc.
- a first object and a second object generally correspond to object A and object B or two different or two identical objects or the same object.
- example is used herein to mean serving as an example, instance, illustration, etc., and not necessarily as advantageous.
- “or” is intended to mean an inclusive “or” rather than an exclusive “or”.
- “a” and “an” as used in this application are generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
- at least one of A and B and/or the like generally means A or B or both A and B.
- such terms are intended to be inclusive in a manner similar to the term “comprising”.
- the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter.
- article of manufacture as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media.
- one or more of the operations described may constitute computer readable instructions stored on one or more computer readable media, which if executed by a computing device, will cause the computing device to perform the operations described.
- the order in which some or all of the operations are described should not be construed as to imply that these operations are necessarily order dependent. Alternative ordering will be appreciated by one skilled in the art having the benefit of this description. Further, it will be understood that not all operations are necessarily present in each embodiment provided herein. Also, it will be understood that not all operations are necessary in some embodiments.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Artificial Intelligence (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Evolutionary Computation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Probability & Statistics with Applications (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Operations Research (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
Description
- Machine learning can be utilized to perform various types of tasks. For example, machine learning can be used for image recognition, video recognition, text recognition, generating recommendations, data security, fraud detection, online search, natural language processing, etc. A machine learning model is trained using a training data set of labeled data samples, such as where the machine learning model is trained with photos labeled as “photo of a car” and “photo not of a car.” After training, the machine learning model can process other photos in order to predict whether such photos depict a car or not. There are various types of machine learning models, such as decision trees, support vector machines, k-nearest neighbors, random forests, linear regression, logistic regression, gradient boosting algorithms, etc.
- In order to train a particular machine learning model and evaluate performance of the machine learning model from the training, custom programming code must be manually written to train the machine learning model. Unfortunately, manually writing custom programming code for every individual machine learning model is cumbersome and resource intensive.
- In accordance with the present disclosure, one or more computing devices and/or methods for a model training framework are provided. The model training framework can be used to train any type of model that is input into the model training framework. For example, a definition of a model and a configuration of the model is received by the model training framework. The definition and configuration of the model may describe the model, what computations the model performs, what parameters the model uses during operation, what hyper parameters should be used to train the model, regularization to apply to the parameters, a learning rate, a training loss function, whether and when checkpoints are to be created, whether and when to enable a debugging mode, a training batch size of training data to input per training iteration, a decay learning rate, optimization procedures to implement, etc. The model training framework may save a record of the model based upon the definition and configuration according to a human readable text format and/or a machine readable serialized format.
- The model training framework may setup computations that the model will perform during training of the model based upon the definition and the configuration. The computations may be spread/assigned across a plurality of processing units, such as graphical processing units, such that outputs by the processing units may be aggregated to determine an output of the model during training. Summary statistics that are to be tracked and/or reported out during training may be specified. The summary statistics may correspond to a training loss function, a value of a regularization loss added to the parameters of the model during training, a learning rate, checkpoints created during training, a training batch size, a number of steps performed by the computations, values of parameters during training, a total training time, etc.
- The model training framework may be configured to perform one or more training iterations to train the model using batches of training data. For example, a first batch of training data is inputted into the model during a first training iteration. The model may perform the computations upon the first batch of training data. During the first training iteration, the summary statistics are tracked. After the first training iteration, the parameters of the model are updated based upon a function (e.g., the parameters are updated in a manner that minimize a loss function). The updated parameters of the model may be used during a second training iteration to process a second batch of the training data. In this way, any number of training iterations may be performed by the model training framework. The summary statistics of the training may be outputted by the model training framework, such as to a user that requested the training of the model.
- While the techniques presented herein may be embodied in alternative forms, the particular embodiments illustrated in the drawings are only a few examples that are supplemental of the description provided herein. These embodiments are not to be interpreted in a limiting manner, such as limiting the claims appended hereto.
-
FIG. 1 is an illustration of a scenario involving various examples of networks that may connect servers and clients. -
FIG. 2 is an illustration of a scenario involving an example configuration of a server that may utilize and/or implement at least a portion of the techniques presented herein. -
FIG. 3 is an illustration of a scenario involving an example configuration of a client that may utilize and/or implement at least a portion of the techniques presented herein. -
FIG. 4 is a flow chart illustrating an example method for a model training framework. -
FIG. 5A is a component block diagram illustrating an example system for a model training framework, where a model definition and configuration is received. -
FIG. 5B is a component block diagram illustrating an example system for a model training framework, where computations that a model will perform are set up. -
FIG. 5C is a component block diagram illustrating an example system for a model training framework, where a first training iteration is performed. -
FIG. 5D is a component block diagram illustrating an example system for a model training framework, where a second training iteration is performed. -
FIG. 6 is an illustration of a scenario featuring an example non-transitory machine readable medium in accordance with one or more of the provisions set forth herein. - Subject matter will now be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific example embodiments. This description is not intended as an extensive or detailed discussion of known concepts. Details that are known generally to those of ordinary skill in the relevant art may have been omitted, or may be handled in summary fashion.
- The following subject matter may be embodied in a variety of different forms, such as methods, devices, components, and/or systems. Accordingly, this subject matter is not intended to be construed as limited to any example embodiments set forth herein. Rather, example embodiments are provided merely to be illustrative. Such embodiments may, for example, take the form of hardware, software, firmware or any combination thereof.
- 1. Computing Scenario
- The following provides a discussion of some types of computing scenarios in which the disclosed subject matter may be utilized and/or implemented.
- 1.1. Networking
-
FIG. 1 is an interaction diagram of ascenario 100 illustrating aservice 102 provided by a set ofservers 104 to a set ofclient devices 110 via various types of networks. Theservers 104 and/orclient devices 110 may be capable of transmitting, receiving, processing, and/or storing many types of signals, such as in memory as physical memory states. - The
servers 104 of theservice 102 may be internally connected via a local area network 106 (LAN), such as a wired network where network adapters on therespective servers 104 are interconnected via cables (e.g., coaxial and/or fiber optic cabling), and may be connected in various topologies (e.g., buses, token rings, meshes, and/or trees). Theservers 104 may be interconnected directly, or through one or more other networking devices, such as routers, switches, and/or repeaters. Theservers 104 may utilize a variety of physical networking protocols (e.g., Ethernet and/or Fiber Channel) and/or logical networking protocols (e.g., variants of an Internet Protocol (IP), a Transmission Control Protocol (TCP), and/or a User Datagram Protocol (UDP). Thelocal area network 106 may include, e.g., analog telephone lines, such as a twisted wire pair, a coaxial cable, full or fractional digital lines including T1, T2, T3, or T4 type lines, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links, or other communication links or channels, such as may be known to those skilled in the art. Thelocal area network 106 may be organized according to one or more network architectures, such as server/client, peer-to-peer, and/or mesh architectures, and/or a variety of roles, such as administrative servers, authentication servers, security monitor servers, data stores for objects such as files and databases, business logic servers, time synchronization servers, and/or front-end servers providing a user-facing interface for theservice 102. - Likewise, the
local area network 106 may comprise one or more sub-networks, such as may employ differing architectures, may be compliant or compatible with differing protocols and/or may interoperate within thelocal area network 106. Additionally, a variety oflocal area networks 106 may be interconnected; e.g., a router may provide a link between otherwise separate and independentlocal area networks 106. - In the
scenario 100 ofFIG. 1 , thelocal area network 106 of theservice 102 is connected to a wide area network 108 (WAN) that allows theservice 102 to exchange data withother services 102 and/orclient devices 110. Thewide area network 108 may encompass various combinations of devices with varying levels of distribution and exposure, such as a public wide-area network (e.g., the Internet) and/or a private network (e.g., a virtual private network (VPN) of a distributed enterprise). - In the
scenario 100 ofFIG. 1 , theservice 102 may be accessed via thewide area network 108 by auser 112 of one ormore client devices 110, such as a portable media player (e.g., an electronic text reader, an audio device, or a portable gaming, exercise, or navigation device); a portable communication device (e.g., a camera, a phone, a wearable or a text chatting device); a workstation; and/or a laptop form factor computer. Therespective client devices 110 may communicate with theservice 102 via various connections to thewide area network 108. As a first such example, one ormore client devices 110 may comprise a cellular communicator and may communicate with theservice 102 by connecting to thewide area network 108 via a wirelesslocal area network 106 provided by a cellular provider. As a second such example, one ormore client devices 110 may communicate with theservice 102 by connecting to thewide area network 108 via a wirelesslocal area network 106 provided by a location such as the user's home or workplace (e.g., a WiFi (Institute of Electrical and Electronics Engineers (IEEE) Standard 802.11) network or a Bluetooth (IEEE Standard 802.15.1) personal area network). In this manner, theservers 104 and theclient devices 110 may communicate over various types of networks. Other types of networks that may be accessed by theservers 104 and/orclient devices 110 include mass storage, such as network attached storage (NAS), a storage area network (SAN), or other forms of computer or machine readable media. - 1.2. Server Configuration
-
FIG. 2 presents a schematic architecture diagram 200 of aserver 104 that may utilize at least a portion of the techniques provided herein. Such aserver 104 may vary widely in configuration or capabilities, alone or in conjunction with other servers, in order to provide a service such as theservice 102. - The
server 104 may comprise one ormore processors 210 that process instructions. The one ormore processors 210 may optionally include a plurality of cores; one or more coprocessors, such as a mathematics coprocessor or an integrated graphical processing unit (GPU); and/or one or more layers of local cache memory. Theserver 104 may comprisememory 202 storing various forms of applications, such as anoperating system 204; one ormore server applications 206, such as a hypertext transport protocol (HTTP) server, a file transfer protocol (FTP) server, or a simple mail transport protocol (SMTP) server; and/or various forms of data, such as adatabase 208 or a file system. Theserver 104 may comprise a variety of peripheral components, such as a wired and/orwireless network adapter 214 connectible to a local area network and/or wide area network; one ormore storage components 216, such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader. - The
server 104 may comprise a mainboard featuring one ormore communication buses 212 that interconnect theprocessor 210, thememory 202, and various peripherals, using a variety of bus technologies, such as a variant of a serial or parallel AT Attachment (ATA) bus protocol; a Uniform Serial Bus (USB) protocol; and/or Small Computer System Interface (SCI) bus protocol. In a multibus scenario, acommunication bus 212 may interconnect theserver 104 with at least one other server. Other components that may optionally be included with the server 104 (though not shown in the schematic architecture diagram 200 ofFIG. 2 ) include a display; a display adapter, such as a graphical processing unit (GPU); input peripherals, such as a keyboard and/or mouse; and a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting theserver 104 to a state of readiness. - The
server 104 may operate in various physical enclosures, such as a desktop or tower, and/or may be integrated with a display as an “all-in-one” device. Theserver 104 may be mounted horizontally and/or in a cabinet or rack, and/or may simply comprise an interconnected set of components. Theserver 104 may comprise a dedicated and/or sharedpower supply 218 that supplies and/or regulates power for the other components. Theserver 104 may provide power to and/or receive power from another server and/or other devices. Theserver 104 may comprise a shared and/or dedicatedclimate control unit 220 that regulates climate properties, such as temperature, humidity, and/or airflow. Manysuch servers 104 may be configured and/or adapted to utilize at least a portion of the techniques presented herein. - 1.3. Client Device Configuration
-
FIG. 3 presents a schematic architecture diagram 300 of aclient device 110 whereupon at least a portion of the techniques presented herein may be implemented. Such aclient device 110 may vary widely in configuration or capabilities, in order to provide a variety of functionality to a user such as theuser 112. Theclient device 110 may be provided in a variety of form factors, such as a desktop or tower workstation; an “all-in-one” device integrated with adisplay 308; a laptop, tablet, convertible tablet, or palmtop device; a wearable device mountable in a headset, eyeglass, earpiece, and/or wristwatch, and/or integrated with an article of clothing; and/or a component of a piece of furniture, such as a tabletop, and/or of another device, such as a vehicle or residence. Theclient device 110 may serve the user in a variety of roles, such as a workstation, kiosk, media player, gaming device, and/or appliance. - The
client device 110 may comprise one ormore processors 310 that process instructions. The one ormore processors 310 may optionally include a plurality of cores; one or more coprocessors, such as a mathematics coprocessor or an integrated graphical processing unit (GPU); and/or one or more layers of local cache memory. Theclient device 110 may comprisememory 301 storing various forms of applications, such as anoperating system 303; one ormore user applications 302, such as document applications, media applications, file and/or data access applications, communication applications such as web browsers and/or email clients, utilities, and/or games; and/or drivers for various peripherals. Theclient device 110 may comprise a variety of peripheral components, such as a wired and/orwireless network adapter 306 connectible to a local area network and/or wide area network; one or more output components, such as adisplay 308 coupled with a display adapter (optionally including a graphical processing unit (GPU)), a sound adapter coupled with a speaker, and/or a printer; input devices for receiving input from the user, such as akeyboard 311, a mouse, a microphone, a camera, and/or a touch-sensitive component of thedisplay 308; and/or environmental sensors, such as a global positioning system (GPS)receiver 319 that detects the location, velocity, and/or acceleration of theclient device 110, a compass, accelerometer, and/or gyroscope that detects a physical orientation of theclient device 110. Other components that may optionally be included with the client device 110 (though not shown in the schematic architecture diagram 300 ofFIG. 3 ) include one or more storage components, such as a hard disk drive, a solid-state storage device (SSD), a flash memory device, and/or a magnetic and/or optical disk reader; and/or a flash memory device that may store a basic input/output system (BIOS) routine that facilitates booting theclient device 110 to a state of readiness; and a climate control unit that regulates climate properties, such as temperature, humidity, and airflow. - The
client device 110 may comprise a mainboard featuring one ormore communication buses 312 that interconnect theprocessor 310, thememory 301, and various peripherals, using a variety of bus technologies, such as a variant of a serial or parallel AT Attachment (ATA) bus protocol; the Uniform Serial Bus (USB) protocol; and/or the Small Computer System Interface (SCI) bus protocol. Theclient device 110 may comprise a dedicated and/or sharedpower supply 318 that supplies and/or regulates power for other components, and/or abattery 304 that stores power for use while theclient device 110 is not connected to a power source via thepower supply 318. Theclient device 110 may provide power to and/or receive power from other client devices. - In some scenarios, as a
user 112 interacts with a software application on a client device 110 (e.g., an instant messenger and/or electronic mail application), descriptive content in the form of signals or stored physical states within memory (e.g., an email address, instant messenger identifier, phone number, postal address, message content, date, and/or time) may be identified. Descriptive content may be stored, typically along with contextual content. For example, the source of a phone number (e.g., a communication received from another user via an instant messenger application) may be stored as contextual content associated with the phone number. Contextual content, therefore, may identify circumstances surrounding receipt of a phone number (e.g., the date or time that the phone number was received), and may be associated with descriptive content. Contextual content, may, for example, be used to subsequently search for associated descriptive content. For example, a search for phone numbers received from specific individuals, received via an instant messenger application or at a given date or time, may be initiated. Theclient device 110 may include one or more servers that may locally serve theclient device 110 and/or other client devices of theuser 112 and/or other individuals. For example, a locally installed webserver may provide web content in response to locally submitted web requests. Manysuch client devices 110 may be configured and/or adapted to utilize at least a portion of the techniques presented herein. - 2. Presented Techniques
- Techniques are provided for a model training framework. The model training framework is configured to train any type of model, such as various types of machine learning models, which are input into the model training framework. This allows a developer of a model to train the model using the model training framework without having to write custom code tailored to that particular model. This greatly reduces the manual human effort and resources otherwise wasted in writing such custom code for each individual model. Furthermore, the time and resources used to train the model are improved because the training can be spread across multiple processors by the model training framework. Furthermore, a ranking model is provided with improve accuracy for processing input images for identifying other similar images such as images that depict the same object as the input image.
- An embodiment of a
model training framework 502 is illustrated by anexample method 400 ofFIG. 4 , which is described in conjunction withsystem 500 ofFIGS. 5A-5D . Themodel training framework 502 may comprise simple and easy to use application programming interfaces (APIs) through which a user can input amodel 506 and information about themodel 506 for training themodel 506. Accordingly, themodel training framework 502 receivesinput 504 of a definition and configuration of themodel 506, at 402. The definition and configuration may describe themodel 506, inputs of themodel 506, outputs of themodel 506, computations performed by themodel 506, modifiable parameters of themodel 506, hyper parameters used to train themodel 506, and/or other information relating to operation of themodel 506 and/or training of themodel 506, such as a training loss function, regularization to add to the parameters, a learning rate, a batch size of input data to train per training iteration, whether and when a debug mode should be enabled, whether and when checkpoints should be created, a decay learning rate, an initial learning rate value, optimizations to apply to themodel 506 during training, etc. - The
model training framework 502 may store a record of themodel 506 as a structure having a serialized machine readable format and/or a textual human readable format. The record may comprise information relating to the definition and configuration of themodel 506, along with information related to the training of themodel 506, such as checkpoints created during the training, a training batch size, an initial learning rate value, a decay learning rate, parameters of themodel 506, values of the parameters during various points in time during training, etc. In this way, the user can view and interpret the record in the textual human readable format, and themodel training framework 502 can access and train themodel 506 using the record in the serialized machine readable format. - At 404, the
model training framework 502 may set upcomputations 508 that themodel 506 will perform during training of themodel 506, as illustrated byFIG. 5B . Thecomputations 508 may be identified and setup by themodel training framework 502 based upon the definition and configuration of themodel 506. In an example, themodel training framework 502 may assign thecomputations 508 across multiple processors, such as graphical processing units, so that somecomputations 508 may be performed in parallel. This may reduce the training time of themodel 506 by efficiently utilizing available resources as opposed the all computations being performed by a single processing unit. Themodel training framework 502 may be configured to aggregate outputs from the processors in order to generate an overall output of themodel 506 during training. - In an example, the
model training framework 502 may apply various modifications to themodel 506 for training. For example, themodel training framework 502 may add weights to themodel 506 based upon regularization information specified within the configuration of theinput 504. Themodel training framework 502 may apply any optimizations specified by theinput 504 to themodel 506. - In an example of regularization, a regularization term is added to the loss function (e.g., the function that training is working towards minimizing) for each parameter of the
model 506 during training. Regularization may be any technique used to make a machine learning model generalize better to unseen data, possibly at the expense of performance on the training data. The regularization added may be referred to as weight decay or L2 regularization, and corresponds to increasing the loss function when numerical values of the parameters are larger. Themodel training framework 502 automatically adds this regularization, and incorporates a subset of the parameters of themodel 506 specified by the user with a regular expression or other filtering function (e.g., incorporating all trainable model parameters by default). The user may also specify a strength of this regularization (e.g., a relative weight of the term in the loss function compared to the loss defined in the model definition), which could be zero or any other value. - At 406,
summary statistics 510 that are to be tracked during training are specified by themodel training framework 502. For example, themodel training framework 502 may specify the summary statistics to track as a training loss function used to update parameters of themodel 506 during training, a value of regularization loss to add to the parameters during training, a learning rate, performance statistics of themodel 506 during training, outputs of themodel 506, and/or a wide variety of other information relating to the training of themodel 506. - The
model training framework 502 may perform one or more training iterations to train themodel 506 based upon batches oftraining data 514, at 408. For example, themodel training framework 502 may perform a first training iteration, as illustrated byFIG. 5C . Themodel training framework 502 may acquire afirst batch 516 oftraining data 514. Thefirst batch 516 of thetraining data 514 may comprise an amount of thetraining data 514 corresponding to the batch size specified for training themodel 506. Themodel training framework 502 inputs thefirst batch 516 of thetraining data 514 into themodel 506 for training themodel 506 based upon the hyper parameters specified within the configuration of themodel 506. In this way, thecomputations 508 performed by themodel 506 will process thefirst batch 516 of thetraining data 514 to generate afirst output 518. During the first training iteration, thesummary statistics 510 are tracked and stored by themodel training framework 502. During the first training iteration, current values of the parameters may be periodically saved as thesummary statistics 510. Other information may be saved as thesummary statistics 510, such as a number of steps performed by thecomputations 508 of themodel 506, a current value of the function (the loss function), a current value of a learning rate, a total training time, etc. - During the first training iteration, the
model training framework 502 may generate one ormore checkpoints 512. A checkpoint may comprise progress of themodel 506 during the first training iteration. The checkpoint may be used to restart the first training iteration from the checkpoint so that the entire first training iteration does not need to be restarted. The checkpoint may be generated based upon a user specified trigger/time, a default trigger/time, and/or based upon themodel training framework 502 receiving an exit command during the first training iteration (e.g., the creation of the checkpoint may be automatically triggered based upon receipt of the exit command). - During the first training iteration, the
model training framework 502 may enter into a debug mode where a user has access to execution functionality/code of themodel 506 being executed by themodel training framework 502. Themodel training framework 502 may enter into the debug mode based upon a debug mode request from the user. Themodel training framework 502 may enter into the debug mode based upon the configuration of themodel 506 specifying that debug mode should be activated based upon some condition (e.g., an amount of training time has occurred, a particular computation is being executed, a certain amount of training data has been processed, etc.). - At 410, the parameters of the
model 506 may be updated based upon a function corresponding to accuracy of the model processing thefirst batch 516 of thetraining data 514, such as a loss function (a training loss function). For example, the parameters are updated to minimize the loss function. The parameters of themodel 506 may be updated during or after the first training iteration. At 412, thesummary statistics 510 are outputting, such as saved or displayed to a user. Thesummary statistics 510 may be outputted by themodel training framework 502 during or after the first training iteration. - Any number of training iterations may be performed by the
model training framework 502 upon themodel 506, such as a second training iteration, as illustrated byFIG. 5D . During the second training iteration, themodel training framework 502 may input asecond batch 530 of thetraining data 514 into themodel 506 for processing by thecomputations 508. Themodel training framework 502 may track various information during the second training iteration as thesummary statistics 510. Themodel training framework 502 may generate one ormore checkpoints 512 during the second training iteration, which can be used to restart the second training iteration at a particular checkpoint. Themodel 506 may generate anoutput 532 based upon the second training iteration, which can be evaluated to see how accurately themodel 506 processed thesecond batch 530 of thetraining data 514. Themodel training framework 502 may adjust values of the parameters of themodel 506 based upon the function (e.g., adjusting parameters to minimize the loss function) and/or the output 532 (e.g., an indication of how accurately themodel 506 processed thesecond batch 530 of the training data 514). - In an example, the
model training framework 502 may receive an action definition from the user. The action definition may specify an action to perform upon themodel 506. For example, the action may be to evaluate performance of themodel 506 during testing after the training is complete. Themodel training framework 502 may execute the action as a script upon themodel 506. - In an example, the
model 506 is trained to identify images having a similar characteristic as an input image. The characteristic may correspond to a depiction of an entity (e.g., an object, a person, a cat, text, etc.). In this way, a user can input a query image into themodel 506 in order to receive search results of other similar images, such as images depicting a similar entity as the entity depicted by the query image. Themodel training framework 502 trains thismodel 506 by inputting pairs of images from thetraining data 514 into themodel 506. A pair of images comprises images having a same characteristic (e.g., two images depicting a cat). Parameters of themodel 506 may be updated to minimize a loss function based upon an accuracy of themodel 506 to identify images having similar characteristics during training. - Once the
model 506 has been trained, then themodel 506 may be tested or deployed. For example, a query image may be inputted into themodel 506. Themodel 506 may compute an embedding vector representing characteristics of the query image. Themodel 506 is controlled to compare the embedding vector to embedding vectors of images within a catalog of images to rank the images within the catalog according to similarity of the images to the query image. One or more of the images may be returned as query results for the query image based upon ranks of the one or more images. -
FIG. 6 is an illustration of ascenario 600 involving an example non-transitory machinereadable medium 602. The non-transitory machinereadable medium 602 may comprise processor-executable instructions 612 that when executed by aprocessor 616 cause performance (e.g., by the processor 616) of at least some of the provisions herein. The non-transitory machinereadable medium 602 may comprise a memory semiconductor (e.g., a semiconductor utilizing static random access memory (SRAM), dynamic random access memory (DRAM), and/or synchronous dynamic random access memory (SDRAM) technologies), a platter of a hard disk drive, a flash memory device, or a magnetic or optical disc (such as a compact disk (CD), a digital versatile disk (DVD), or floppy disk). The example non-transitory machine readable medium 602 stores computer-readable data 604 that, when subjected to reading 606 by areader 610 of a device 608 (e.g., a read head of a hard disk drive, or a read operation invoked on a solid-state storage device), express the processor-executable instructions 612. In some embodiments, the processor-executable instructions 612, when executed cause performance of operations, such as at least some of theexample method 400 ofFIG. 4 , for example. In some embodiments, the processor-executable instructions 612 are configured to cause implementation of a system, such as at least some of theexample system 500 ofFIGS. 5A-5D , for example. - 3. Usage of Terms
- As used in this application, “component,” “module,” “system”, “interface”, and/or the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
- Unless specified otherwise, “first,” “second,” and/or the like are not intended to imply a temporal aspect, a spatial aspect, an ordering, etc. Rather, such terms are merely used as identifiers, names, etc. for features, elements, items, etc. For example, a first object and a second object generally correspond to object A and object B or two different or two identical objects or the same object.
- Moreover, “example” is used herein to mean serving as an example, instance, illustration, etc., and not necessarily as advantageous. As used herein, “or” is intended to mean an inclusive “or” rather than an exclusive “or”. In addition, “a” and “an” as used in this application are generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form. Also, at least one of A and B and/or the like generally means A or B or both A and B. Furthermore, to the extent that “includes”, “having”, “has”, “with”, and/or variants thereof are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising”.
- Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing at least some of the claims.
- Furthermore, the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
- Various operations of embodiments are provided herein. In an embodiment, one or more of the operations described may constitute computer readable instructions stored on one or more computer readable media, which if executed by a computing device, will cause the computing device to perform the operations described. The order in which some or all of the operations are described should not be construed as to imply that these operations are necessarily order dependent. Alternative ordering will be appreciated by one skilled in the art having the benefit of this description. Further, it will be understood that not all operations are necessarily present in each embodiment provided herein. Also, it will be understood that not all operations are necessary in some embodiments.
- Also, although the disclosure has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The disclosure includes all such modifications and alterations and is limited only by the scope of the following claims. In particular regard to the various functions performed by the above described components (e.g., elements, resources, etc.), the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure. In addition, while a particular feature of the disclosure may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application.
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/541,751 US12067462B2 (en) | 2019-08-15 | 2019-08-15 | Model training framework |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/541,751 US12067462B2 (en) | 2019-08-15 | 2019-08-15 | Model training framework |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20210049500A1 true US20210049500A1 (en) | 2021-02-18 |
| US12067462B2 US12067462B2 (en) | 2024-08-20 |
Family
ID=74567387
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/541,751 Active 2042-08-24 US12067462B2 (en) | 2019-08-15 | 2019-08-15 | Model training framework |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12067462B2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210398020A1 (en) * | 2020-06-19 | 2021-12-23 | Apple Inc. | Machine learning model training checkpoints |
| CN115660064A (en) * | 2022-11-10 | 2023-01-31 | 北京百度网讯科技有限公司 | Model training method, data processing method and device based on deep learning platform |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20220286366A1 (en) * | 2021-03-02 | 2022-09-08 | POSTECH Research and Business Development Foundation | Method and apparatus for graph neural network based virtual network management |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180157939A1 (en) * | 2016-12-05 | 2018-06-07 | Avigilon Corporation | System and method for appearance search |
| US20200334524A1 (en) * | 2019-04-17 | 2020-10-22 | Here Global B.V. | Edge learning |
-
2019
- 2019-08-15 US US16/541,751 patent/US12067462B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180157939A1 (en) * | 2016-12-05 | 2018-06-07 | Avigilon Corporation | System and method for appearance search |
| US20200334524A1 (en) * | 2019-04-17 | 2020-10-22 | Here Global B.V. | Edge learning |
Non-Patent Citations (15)
| Title |
|---|
| Abadi et al. "TensorFlow: A System for Large-Scale Machine Learning" 12th USENIX Symposium on Operating Systems Design and Implementation; ISBN 978-1-931971-33-1 [retrieved on 2022-08-09] (Year: 2016) * |
| balancap/tf-imagenet. [Code Repository] Github. committed on March 7, 2018 [retrieved on 2022-08-10]. Retrieved from <<https://github.com/balancap/tf-imagenet>> (Year: 2018) * |
| Baylor et al. "TFX: A TensorFlow-Based Production-Scale Machine Learning Platform" KDD’17, August 13–17, 2017, Halifax, NS, Canada [retrieved on 2024-03-27] (Year: 2017) * |
| Blot et al. "Gossip training for deep learning" arXiv:1611.09726v1 [cs.CV] [retrieved on 2023-03-25] (Year: 2016) * |
| Bonawitz et al. "TOWARDS FEDERATED LEARNING AT SCALE: SYSTEM DESIGN" Proceedings of the 2 nd SysML Conference, Palo Alto, CA, USA, 2019 [retrieved on 2024-03-27] (Year: 2019) * |
| floydhub/save-and-resume. [Code Repository] Github. committed on November 22, 2017 [retrieved on 2022-08-10]. Retrieved from <<https://github.com/floydhub/save-and-resume>> (Year: 2017) * |
| horovod/horovod [Code Repository] Github. committed on August 13, 2019 [retrieved on 2024-03-27]. Retrieved from <<https://github.com/horovod/horovod/tree/e621787043ef5ff1f5ced6ee9ab6b4a487cf8170>> (Year: 2019) * |
| keras-team/keras. [Code Repository] Github. committed on March 12, 2019 [retrieved on 2023-03-25] Retrieved from <<https://github.com/keras-team/keras/blob/995f1e708fc189fd2a6786be96edf82abab2c599/keras/callbacks/callbacks.py>> (Year: 2019) * |
| Miao et al. "Towards Unified Data and Lifecycle Management for Deep Learning" 2017 IEEE 33rd International Conference on Data Engineering [retrieved on 2024-03-27] (Year: 2017) * |
| mlflow/mlflow. [Code Repository] Github. committed on August 12, 2019 [retrieved on 2022-08-10]. Retrieved from <<https://github.com/mlflow/mlflow/tree/69fabbcf59b690f021bf047c0bf3e2de594c70e6>> (Year: 2019) * |
| Papper, M. "Debugging Tensorflow" [Blog] Published March 03, 2019 [retrieved on 2022-08-11]. <<Retrieved from https://www.paepper.com/blog/posts/debugging-tensorflow/>> (Year: 2019) * |
| Peixeiro, M. "How to Improve a Neural Network With Regularization" Medium.com [Blog post] Published March 2019 [retrieved on 2022-08-10]. (Year: 2019) * |
| Ruede, R. "Backchannel Prediction for Conversational Speech Using Recurrent Neural Networks" [Thesis] Institute for Anthropomatics and Robotics, Interactive Systems Lab [retrieved on 2022-08-09]. (Year: 2016) * |
| Salvaris et al. "Deep Learning with Azure" Editors, Apress; https://doi.org/10.1007/978-1-4842-3679-6 [retrieved on 2024-03-27] (Year: 2018) * |
| Sergeev et al. "Horovod: fast and easy distributed deep learning in TensorFlow" arXiv:1802.05799v3 [cs.LG] [retrieved on 2023-03-25] (Year: 2018) * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210398020A1 (en) * | 2020-06-19 | 2021-12-23 | Apple Inc. | Machine learning model training checkpoints |
| CN115660064A (en) * | 2022-11-10 | 2023-01-31 | 北京百度网讯科技有限公司 | Model training method, data processing method and device based on deep learning platform |
Also Published As
| Publication number | Publication date |
|---|---|
| US12067462B2 (en) | 2024-08-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11580325B2 (en) | Systems and methods for hyper parameter optimization for improved machine learning ensembles | |
| US11375030B2 (en) | Future event detection and notification | |
| US11817994B2 (en) | Time series trend root cause identification | |
| US11914582B2 (en) | Suggesting queries based upon keywords | |
| US9922361B2 (en) | Content suggestions | |
| US10019291B2 (en) | Determining resource utilization by one or more tasks | |
| US11947633B2 (en) | Oversampling for imbalanced test data | |
| US12332905B2 (en) | Search across multiple user interfaces | |
| US10120946B2 (en) | Emotionally relevant content | |
| US10643141B2 (en) | User action prediction | |
| US12067462B2 (en) | Model training framework | |
| US20220245507A1 (en) | Automated model update pipeline | |
| US11290521B2 (en) | Target webpage performance | |
| US20170109002A1 (en) | User interface generation | |
| US12423164B2 (en) | Adaptive API call sequence detection | |
| US10949449B2 (en) | Systems and methods for efficient electronic message storage and retrieval | |
| US10810148B2 (en) | Device interfacing | |
| US11243669B2 (en) | Transmitting response content items | |
| US11467895B2 (en) | Classifier validation | |
| US20250383943A1 (en) | Adaptive api call sequence detection | |
| US20170083514A1 (en) | In-context translation review | |
| US20170154360A1 (en) | Onboarding feature cues | |
| US20160063542A1 (en) | Providing information associated with a product |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: OATH INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DODDS, ERIC MCVOY;NGUYEN, HUY XUAN;SIGNING DATES FROM 20190806 TO 20190813;REEL/FRAME:050065/0358 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: VERIZON MEDIA INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OATH INC.;REEL/FRAME:054258/0635 Effective date: 20201005 |
|
| AS | Assignment |
Owner name: YAHOO ASSETS LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO AD TECH LLC (FORMERLY VERIZON MEDIA INC.);REEL/FRAME:058982/0282 Effective date: 20211117 Owner name: YAHOO ASSETS LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNOR:YAHOO AD TECH LLC (FORMERLY VERIZON MEDIA INC.);REEL/FRAME:058982/0282 Effective date: 20211117 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| AS | Assignment |
Owner name: ROYAL BANK OF CANADA, AS COLLATERAL AGENT, CANADA Free format text: PATENT SECURITY AGREEMENT (FIRST LIEN);ASSIGNOR:YAHOO ASSETS LLC;REEL/FRAME:061571/0773 Effective date: 20220928 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
| ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |